Hacker News

hackinfo delivers the latest news updates related to Security breach, Cyber Crime, vulnerability, Cyber Security and Penetration testing tools and more.

  • Home
  • Beauty
  • Health
  • General
  • About

Recent Post

Total Pageviews

Blog Archive

  • ►  2015 (5)
    • ►  January (5)
  • ▼  2014 (41)
    • ►  December (10)
    • ►  November (1)
    • ▼  October (9)
      • Apple Pay: Your guide to shopping with mobile paym...
      • Full Approved Google AdSense Account for sell
      • News Details of 5 of the best hackers in the world
      • How to Install VMware and Use VMware to Install Ub...
      • ‘Bash’ bug could let hackers attack through a ligh...
      • Toyota Recalls 20,000 Vehicles For Possible Fuel Leak
      • Microsoft now lets eligible students sign up for f...
      • Chrysler Group recalls nearly 190,000 SUVs for fue...
      • Dissociate myself from any vestiges
    • ►  September (3)
    • ►  May (12)
    • ►  April (6)
Design by HunterDevil Copyright © 2014. Powered by Blogger.

Search This Blog

Pages

  • Home

Author

  • hi
  • hotnews.com

Infolinks in Text Ads

Hacker News

Followers

Home » Archives for October 2014

Tuesday, October 21, 2014

Apple Pay: Your guide to shopping with mobile payments, but keep the credit card handy

Apple's mobile payment system, Apple Pay, made its debut Monday. Now you can flash your new iPhone in the checkout line to pay for food, clothing and other goods. There's no need to pull out your credit card.
But don't leave your wallet or purse behind quite yet: Despite a few dozen retail chains pledging support for Apple Pay, so-called contactless payments are still new. Smaller merchants, in particular, aren't likely to have the necessary equipment right away.
Here's a guide to how Apple Pay works and what to expect:
Q. What do I need to use Apple Pay?
A. To fully use Apple Pay, you'll need an iPhone 6 or iPhone 6 Plus with iOS 8.1, a free software update released Monday. You'll also get some online-only features with the iPad Air 2 and iPad Mini 3 coming out later this week. Older devices won't work, even with the 8.1 update.
You'll also need a credit card that works with Apple Pay. Major credit card issuers such as American Express, Bank of America, Capital One, Chase, Citibank and Wells Fargo are backing Apple Pay. Apple says more than 500 banks are participating, representing about 83 percent of the card volume in the U.S.
To get started, use the Passbook app or go to "Passbook & Apple Pay" in the settings.
Q. Is it secure?
A. Although security measures are never foolproof, the Apple Pay system is safer than many current pay methods.
For one thing, a substitute account number is assigned when you set up Apple Pay. Merchants get that instead of your real card number. In addition, a verification code is created for each transaction, based in part on unique keys on the phone. Even if hackers get that substitute number, they wouldn't be able to generate the verification code without having possession of your phone, so fraudulent transactions would be declined.
Other services are starting to use one-time verification codes, too, but not all of them use the substitute account number. By using that substitute, a credit card issuer could cancel the number just for the phone, should you lose it. You wouldn't need to replace the entire card.
Apple says it knows nothing about your transactions, which are handled directly by the credit card processors.
Q. Where can I use Apple Pay?
A. Most retail stores that accept contactless payments should be able to use Apple Pay, as well as Google Wallet, Softcard and other services that are based on a wireless-chip technology called near-field communication, or NFC. It's possible that some stores have the hardware in place, but haven't turned on the functionality yet. The debut of Apple Pay is likely to prompt those merchants to do so.
A few dozen chains, including Macy's, McDonald's, Subway and Whole Foods, are expected to accept Apple Pay right away, though some of their stores might not be ready yet. Other retailers expected to do so by the end of the year include Staples, Urban Outfitters and Walt Disney Parks and Resorts.
Apple is distributing logos to merchants that accept Apple Pay, similar to symbols for Visa and MasterCard, though the lack of a logo doesn't necessarily mean Apple Pay isn't accepted.
In addition, you can use Apple Pay to make online purchases within apps, without having to enter card numbers, billing addresses and other information. It's up to merchants to enable this with app updates. Groupon, OpenTable, Staples and Target are among the initial ones to do so. You'll see a button for "Apple Pay" or "Buy with Apple Pay." The new iPads will be able to make in-app payments, but they lack NFC chips for in-store payments.
Q. What about smaller merchants?
A. Dry cleaners, local restaurants and other smaller businesses are less likely to have the equipment ready. All told, there are more than 200,000 payment terminals in the U.S. capable of making "contactless" transactions, but that's out of several million.
Starting late next year, merchants will be liable for fraudulent transactions if they don't have equipment with an enhanced security system called EMV. Because merchants have to upgrade equipment to EMV anyway, they can get the NFC capability for not much more.
But many equipment makers hesitated because demand for NFC hasn't been clear. Soon after Apple announced support, iPad-based retail payment system ShopKeep decided to start including NFC and plans to distribute new equipment to its 10,000 merchants over the next year. Other equipment makers are expected to do the same.
Even though relatively few small merchants can now accept NFC payments such as Apple Pay, that's bound to change in a year when the EMV deadline comes.
Q. Do I have to pay to use it?
A. Apple hasn't said much about how it plans to make money from Apple Pay transactions, but it's safe to say that credit card companies would be the ones covering any fees. Card companies might factor in those costs in the regular fees that consumers and merchants pay. However, those companies might be able to use savings from fraud reduction to cover any Apple Pay costs.
Q. How does this differ from other contactless systems?
A. Most noticeable will be the use of the fingerprint ID sensor to authorize transactions. Right now, it's easy to pull out a plastic credit card, so any mobile-payment system will have to be just as easy. That can't be said when you have to spend time typing in a passcode at the checkout line. The fingerprint ID lets you bypass that with one tap.

Monday, October 20, 2014

Full Approved Google AdSense Account for sell

We are seller of Full Approved Google Adsense Account for your any website or new/old blog site within 3 working days.if you need any account please contact with us,
contact No : 01671522262
Email : huntedavi@gmail.com

Saturday, October 18, 2014

News Details of 5 of the best hackers in the world

There are many hackers around the world. Hackers are famous for their many, many infamous and distinguished or None. Today's top 5 in the world that hackers !! their kandakarakhana
Kevin minika (Kevin Mitnick)
Born in 1963, the UK's most dangerous hacker Kevin minika. He was known as Condor. To arrest him in 1995 on charges of hacking. He is just 1 year old because of interest in Los Angeles tryanajita Card System Bypass karenasudhumatra Nokia, Mitsubishi, Siemens, and many electronic products site was hacked.
Kevin palasena (Kevin Poulsen)
He was born in 1965. Her name was Cyber ​​Dark Dante. Was a terrible black hat hacker. KIIS-FM in Los Angeles the popular FM radio and full control of the hack, he is famous for. When the contest was going on the radio. 10 th callers were told the car would be a Porshe 944 S2. Be the 10 th caller to jam telephone lines palasena and win awards nenatabe be held in July 1994.
Eddriyana lamo (Adrian Lamo)
New York Times, Yahoo! News, and Microsoft allegedly hacked him in 003, was arrested by the Army. He caught a 15-months were fled. Karenatake attasamarpana 65000 dollars to cover the court. He was a gray hat hacker.
Robert Morris Jr. (Robert T.Morris Jr)
Sasti his infamous Morris Worm in 1998. He just wanted to know how the computer is connected to the Internet. But it's going to say that the loss of almost 530.000 dollars tinitake is arrested and is called to fix the damages. Then he was released and is now an engineering University Professor Morris.
Eric's lap (Eric Coley)
He is most famous for his chaddanama Emmanuel Goldstein. In 1999, he created DeCSS code, it was opened to use and download. It Right
Could be a Right Protected DVD. He was the first person to be punished under the Digital Millennium Copyright Act of 2006 Enterprise Inc. He hayabartamane The name of the company. The company 2006: The Hacker Quarterly Magazine for the hackers out.
There is also our country
Hacker "Tiger-Met" is one of the world's best hackers.

Friday, October 17, 2014

How to Install VMware and Use VMware to Install Ubuntu

How to Install VMware


Ubuntu latest version for 32bit  download link

1st download
 VMplayer downloadhttp://vmware-player.en.softonic.com/download


For SETUP VMplayer
open the fire 


  1. Double click on the VMware software application if you have already had or downloaded, then run it.
  2. Install VMware and Use VMware to Install Ubuntu Step 4.jpg

    2Click "Next" to install.
  3. Install VMware and Use VMware to Install Ubuntu Step 5.jpg

    3Keep pressing “Next” until you see this screen.
     It means the program is running.
  4. Install VMware and Use VMware to Install Ubuntu Step 6.jpg

  5. 4After than, double click on the Icon which is named VMware Workstation is located on the desktop.
     Clicking on File --> New --> Virtual Machine… this screen will appear, then choose Typical --> Next.
  6. Install VMware and Use VMware to Install Ubuntu Step 8.jpg

    5If you have software in DVD which contained software that you want to create, choose Install disc.
     Otherwise, Choosing the Installer Disc image file (ISO) software application with extension ISO.
  7. Install VMware and Use VMware to Install Ubuntu Step 9.jpg

    6Keep pressing “Next” to continue, you see the screen mentions about browsing directory Ubuntu will be stored in.
     Click “Next”.
  8. Install VMware and Use VMware to Install Ubuntu Step 10.jpg

    7Setting maximum disk size (GB) as 8 and choose the option “Store virtual disk as a single file”, then hit "Next"
  9. Install VMware and Use VMware to Install Ubuntu Step 11.jpg

    8Requesting username and password in Ubuntu.
  10. Install VMware and Use VMware to Install Ubuntu Step 12.jpg

    9Keep pressing "Next" until you see the picture.
  11. Install VMware and Use VMware to Install Ubuntu Step 13.jpg
    10
    Hit Finish to end the creating of new Virtual Machine.
  12. Install VMware and Use VMware to Install Ubuntu Step 14.jpg
    11
    It will automatically reboot and take you go to this screen, next, it will run an Ubuntu application as well (the one input "Ubuntu. SO" above step).
  13. Install VMware and Use VMware to Install Ubuntu Step 15.jpg
    12
    The installing screen will appear and run as the picture. Being patient to wait
  14. Install VMware and Use VMware to Install Ubuntu Step 17.jpg
    Install VMware and Use VMware to Install Ubuntu Step 16.jpg
    13
    After finish running the installation, it will bring you go to this following screen, type the username and password which is created before.
  15. Install VMware and Use VMware to Install Ubuntu Step 18.jpg
    14
    Finally, you have done setting Ubuntu Operating System.

Wednesday, October 15, 2014

‘Bash’ bug could let hackers attack through a light bulb

NEW YORK (CNNMoney) —Say hello to the party bug, a session in why Internet-connected gadgets are naturally risky.

Computer protection scientists have found a defect in the way many gadgets connect over the Online.
The issue expands to plenty of Internet-connected computer systems located anywhere — from shops to medical centers to educational institutions.
It’s worse if you’re one of those technology-covering types who purchase Internet-connected “smart” equipment. But keep in mind that has a lot more businesses and government authorities that use intelligent gadgets — like cameras — within their inner systems.
Why worry the party bug? According to free company Red Hat, it impacts any program that uses the os Linux system — such as everything from hand calculators to vehicles. But it also impacts Apple Mac pcs and some Windows and IBM devices. Google said no Android operating system devices are vulnerable.
In a public caution, Red Hat scientists categorized the degree of the bug as “catastrophic.”
Not every linked program is insecure. But it’s difficult for the person to figure out if, for example, their wireless house protection camera is at risk. The issue is new, but online hackers have already been captured trying to manipulate the defect to set up bonnets — hijacking vast variety of computer systems. They can then use these servant military of gadgets to distribute malaria or attack websites.
In the event of Heart hemorrhage, online hackers gradually split into a medical center program and took 4.5 million individual information — such as Social Security figures.
Norwegian online protection advisor Per Thorsheim mentioned that the bug leave become old news — but people will still constitute insecure.
The only solution for the party bug? If and when a spot becomes available, upgrade every program you have. Companies don’t often upgrade their navy of gadgets, and customers hardly ever give attention for that sort of thing.
Security individuals order IT divisions are now running examinations on pcs to see if online hackers have utilized this defect before. That issue
The issue arises from a defect in the “bash,” a type of application called and spends. A spend converts instructions from you to a unit’s os. Plenty of Internet-connected gadgets use the party spends to run instructions, like “turn on” plus “turn off.” Generally, a program that conveys using a party spends also looks for additional details, like what internet browser or program you’re using.
And that’s where the issue can be found. If a cyberpunk felled bad program code into this additional data, they can put past a unit’s safety measures.
A “smart,” Internet-connected lamp then instantly becomes a release pad to crack everything else behind your program firewall program, Graham said. That could be your desktop pc, or a merchant’s payment devices, or a government office’s delicate data source of details.
The bug was found by Stéphane Chazelas, a France IT administrator working for an application manufacturer in Scotland.
Have you had money thieved from your banking account lately? Share your tale with CNN.

Toyota Recalls 20,000 Vehicles For Possible Fuel Leak

Chevy Motor Corp said it’s remembering about 20,000 automobiles globally over possible energy leaking,Reuters revealed on Friday.t27
Most of the impacted automobiles are in the U. s. Declares, but were also delivered to other nations as well. Chevy Motor Sales USA said the remember contains automobiles with its 2GR-FE engine.
The remember contains the 2015 design season Lincoln RX, and four 2014 design season Chevy vehicles: Avalon, Camry, Highlander and Sienna. A energy distribution tube in the engine was not properly welded by a Chevy provider organization and may flow, the car maker said. The risk of flame could increase with the flow.
Toyota ordered it was not aware of any accidents, shoots, accidents or deaths due to the problem. All of the Chevy designs in query were created in the U. s. Declares, with the Lincoln design made in North america. They were delivered around the world to Russian federation, Sydney, Southern South korea and other areas of Japan and the Center Eastern.
Safety authorities have consistent remember realises sent to vehicle entrepreneurs to try to get more people to accept remembered vehicles fixed. The package says “Safety Recall Notice” in red characters across its lower right area and shows the images of the Division of Transport and the Nationwide Road TrafficProtection Management. They believe this will make the realises more noticeable and avoid customers from complicated them with ads and other email, the LA Times revealed.
The car organization said that when entrepreneurs take their vehicles back to the traders, techniques will examine the energy distribution tube for any mistakes. If it was created by the provider that performed the bad set up, it will be changed, the organization said. Chevy did not name the provider.
Car companies have remembered approximately 46 thousand automobiles so far this season, splitting the history for the market.

Microsoft now lets eligible students sign up for free Office 365 subscriptions

Microsoft has announced a new self-serve program for students at eligible schools that allows them to sign up for a free Office 365 license on their own. The offer is available first in the US and will roll out globally later this year.
The new program builds on the Student Advantage initiative that launched last year. Previously, schools had to go through several steps in order to approve free Office subscriptions, but now students can sign up online using their school email address. In order to qualify, students need to be attending campuses that have purchased an organization-wide Volume Licensing Program.
Students will get Word, Excel, PowerPoint, OneNote, Outlook, Access and Publisher on up to five PCs or Macs. They’ll also have access to Office apps on Windows tablets and the iPad, 1 TB of OneDrive storage, and Office Online.
Education faculty will also be able to get free Office 365 ProPlus subscriptions, which include desktop versions of the productivity software but lack email, web conference, file storage, and site mailbox features, later this year if their campuses purchase an organization-wide Office license. US-based teachers can start signing up for Office 365 ProPlus in October, followed by international availability later this year.

Chrysler Group recalls nearly 190,000 SUVs for fuel pump issue over 70 complaints received

t9A new task is experiencing The Chrysler Team as they remember nearly 190,000 of their SUV’s from their Automobile Huge Cherokee collection. The automobiles affected are from 2011 and include a defective fuel-pump that can cause your vehicle to wait without caution, or doubt.
Safety supporters are already saying that those remember isn’t wide-ranging enough and that the problem at side could be occurring in an incredible number of other Chrysler designs.
The anticipations is that more remembers will be arriving, and they will start arriving more intenselythis 7 days – as the marketplaces start in the U. s. Declares – and customers really start to ask more concerns, and researchers have more time to dig into the problems around the Chrysler automobiles.
Although it’s far too beginning to order that we could constitute looking at another GM problems, it would be silly to confess right now that this couldn’t flower into something considerably bigger.
Those remember was formally published Weekend by the Nationwide Road Visitors Protection Management, and it includes some 2011 designs. The designs involved accept a three. Six-liter V6 or five.7-liter V-8 Google. The successfully transfer function in the force is the part in query that can eventually don’t succeed, and cause the prospective catastrophe.
However, at the end of Aug the company was unacquainted with any accidents, accidents or deaths due to those remember.
Oddly enough though, this problem has been under research since last Oct, and this is the primary purpose why so many are contesting the small opportunity of remember. According to the Middle for Automatic Protection, a non-profit established by Rob Nader has said that the same energy force management component which contains the successfully transfer is in 5 thousand other automobiles.
The NHTSA has mentioned that problems have been shifting in around the electric management techniques in the automobiles since 2007 and that the govt and Middle for Automatic Protection have been getting thousands of problems around this very problem.
The “Totally Incorporated Energy Module” is in the remembered automobiles now, because it homes thesuccessfully transfer in query – that has been mentioned to don’t succeed – but Chrysler had only started fazing them out this year. This permitted for nearly 5 years to successfully pass as they were stayed consistently used in a wide-range of automobiles.
Moving ahead car entrepreneurs and Chrysler supporters as well should keep a very near eye on what upcoming remembers could be arriving – as a prospective case looms. Car entrepreneurs can actually force for a case that could cause a research by the NHTSA – which could probably cause to higher remembers, and more responsibility within the development collections at Chrysler.

Dissociate myself from any vestiges

As I consider choices on a daily base, I ask the concern, "What would God do under identical circumstances?" Often, it is difficult to figure out the right reaction that would cause me down the direction of personal piety. During the desire, God clearly conversed with me in a clear sculpt. I instantly believed that His declaration would have the impact of switching my world benefit down. As I consider choices on a daily base, I ask the concern, “What would God do under identical circumstances?” Often, it is difficult to figure out the right reaction that would cause me down the direction of personal piety. During the desire, God clearly conversed with me in a clear sculpt. I instantly believed that His declaration would have the impact of switching my world benefit down.
Immediately my thoughts exhibited to Pat Robertson, the preacher from The 700 Team who incredibly leg-pressed 2000lbs. If anyone could validate the veracity of my synchronistic, religious encounter it would Reverend Robertson. It was Pat Robertson, along with Dental Roberts, Jerry Farwell and others who had adequate encounter with this problem of heavenly mediation. Pat e-mailed me back offering me with verification that I was clearly listening to the speech of God.
Trusting Pat’s wideness regarding my pipe to the Almighty, I noticed that indeed God had discussed to me and was staking His declare as a bonfire right-wing Republican. My thoughts then endlessly came to another believed. What changes were I expected to make in reaction to this extraordinary disclosure? Several thoughts overloaded my thoughts. If I was to be the lord’s boat, I required to: Dissociate myself from any vestiges of Artist. Get rid of all of my CD’s apart from my Bon Jove selection. Postpone around the world since it is the brain-child of internet expert Jordan Gore. No more observe the famous host opera Display.
Exercise the phrase abomination. Learn to think non colored documents without being wishy-washy. Believe in my values even if they oppose my encounter. Accept the euphemism of pro-life even though it is contradictory with the sight of lose center and dying from pre-emptive war Believe that the Combined Declares is the only nation that gets The lord’s unique advantage and benefit. Declare that the axis of wicked only prevails in the thoughts and hearts and thoughts of other nations, never our own. Postpone the idea of separating of chapel and state because our nation was established on Religious concepts.
Faith-based projects should obtain tax smashes even if they are exclusionary. As I believed my new list of claims, I sensed a feeling of comfort. God had provided His concept. No more a “bleeding center generous,” I made my way out into the group to discuss my new viewpoint. Wayne P. Rebel is an writer, self-employed writer and nationwide qualified cognitive-behavioral specialist exercising in Phoenix, State of Arizona.
He has trained Masters level sessions in specialist knowledge thought Chapman Institution of Florida. Wayne obtained the Mentor of the Year Prize for his participation to the Tempe, State of Arizona Institution Section. He is released in the Il Therapy Publication on the subject of intellectual therapy’s program to the treatment of anorexia therapy. He is a presented writer for Nu Picture Journal, a source for health professionals and people. He is also a presented writer He has a concern and reaction structure on regarding family concerns. Wayne focuses on working with people who have depressive, stress and autistic array conditions.

Popular Posts

  • popular Image board 4chan hacked
    The next day after Bihar BJP's official website get hacked by hacker claimed to be from Pakistan, the official website of Senior B...
  • NASA and the ESA confirm that the lost Beagle-2 orbiter has been found on Mars
    Back in 2003, a full month before NASA’s Opportunity landed on Mars, the British probe Beagle-2 entered orbit as part of the Mars Expres...
  • NASA’s New Horizons space probe: Powered by PlayStation
    Today is a milestone for the New Horizons probe. The spacecraft, which launched nearly nine years ago, has just begun its official six...
  • NVIDIA DEMOS A CAR COMPUTER TRAINED WITH “DEEP LEARNING”
    Many cars now include cameras or other sensors that record the passing world and trigger intelligent behavior, such as automatic braking o...
  • Chemical-Sensing Displays and Other Surprising Uses of Glass
    An inside look at Corning’s labs suggests what’s next for the inventor of Gorilla Glass. Someday your smartphone might be able to help...
  • Toyota Recalls 20,000 Vehicles For Possible Fuel Leak
    Chevy Motor Corp said it’s remembering about 20,000 automobiles globally over possible energy leaking, Reuters revealed on Friday. Most o...
  • Desalination out of Desperation
    Even in drought-stricken California, San Diego stands out. It gets less rain than parched Los Angeles or Fresno. The region has less groundw...
  • South Korea nuclear plant hit by hacker
    The hacking comes in the wake of increased tension and trouble from North Korea, though the source has not been confirmed. Computers a...
  • News Details of 5 of the best hackers in the world
    There are many hackers around the world. Hackers are famous for their many, many infamous and distinguished or None. Today's top 5 in...
  • INTEL’S BROADWELL IS COMING TO MAINSTREAM LAPTOPS
    Intel’s Broadwell is coming to mainstream laptops — here’s what you need to know CES has always been a major launch window for Intel a...

 
Hacker News © 2014. All Right Reserved
DMCA | Privacy Policy
  • Facebook
  • twitter
  • googleplus
  • youtube